close
1.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9326
オンライン: http://dx.doi.org/10.1007/978-3-319-24174-6
2.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9327
オンライン: http://dx.doi.org/10.1007/978-3-319-24177-7
3.

電子ブック

EB
edited by Michael Reiter, David Naccache
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9476
オンライン: http://dx.doi.org/10.1007/978-3-319-26823-1
4.

電子ブック

EB
edited by Guojun Wang, Albert Zomaya, Gregorio Martinez Perez, Kenli Li
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9532
オンライン: http://dx.doi.org/10.1007/978-3-319-27161-3
目次情報: 続きを見る
Trust, security and privacy for Big Data
Trust, security and privacy for emerging applications
Network optimization and performance evaluation
Sensor-cloud systems
Security and privacy protection in computer and network Systems
Dependability in sensor, cloud, and Big Data systems
Trust, security and privacy for Big Data
Trust, security and privacy for emerging applications
Network optimization and performance evaluation
5.

電子ブック

EB
edited by Alistair Barros, Daniela Grigori, Nanjangud C. Narendra, Hoa Khanh Dam
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9435
オンライン: http://dx.doi.org/10.1007/978-3-662-48616-0
6.

電子ブック

EB
by Giovanni Livraga
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Advances in Information Security ; 57
オンライン: http://dx.doi.org/10.1007/978-3-319-16109-9
目次情報: 続きを見る
Introduction
Related Work
Enforcing Confidentiality and Visibility Constraints
Counteracting Inferences from Sensitive Volume Distributions
Enforcing Dynamic Read and Write Priviledges
Conclusions
Introduction
Related Work
Enforcing Confidentiality and Visibility Constraints
7.

電子ブック

EB
by Alan Moran
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
オンライン: http://dx.doi.org/10.1007/978-3-319-16262-1
目次情報: 続きを見る
1 Introduction
Part I Agile Strategy
2 Strategy and Innovation
3 Financial Management
Part II Implementation
4 Agile Project Management
5 Agile Programme Management
6 Governance
7 Quality and Test Management
8 Risk Management
9 Configuration Management
Part III Organisation and People
10 Organisation
11 People Factors
Appendix A: Agile Manifesto and Principles
Appendix B: Agile Techniques
Appendix C: DSDM Roles
Appendix D: Five-Factor Model Facets
1 Introduction
Part I Agile Strategy
2 Strategy and Innovation
8.

電子ブック

EB
edited by Jan Camenisch, Simone Fischer-Hubner, Marit Hansen
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: IFIP Advances in Information and Communication Technology ; 457
オンライン: http://dx.doi.org/10.1007/978-3-319-18621-4
目次情報: 続きを見る
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life
Towards an Engineering Model of Privacy-Related Decisions
The Value of Personal Data
Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model
Privacy and Confidentiality in Service Science and Big Data Analytics
The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy ? Where Are We Now?
EUROSUR ? A Sci-fi Border Zone Patrolled by Drones?
Anonymous e Petitions ? Another Step Towards e Democracy
A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011
Privacy by Design ? The Case of Automated Border Control
Patterns in Privacy - A Pattern-Based Approach for Assessments
A Survey on Multimodal Biometrics and the Protection of Their Templates
Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design
Blank Digital Signatures: Optimization and Practical Experiences
Tools for Cloud Accountability: A4Cloud Tutorial
Privacy for Peer Profiling in Collective Adaptive Systems
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life
Towards an Engineering Model of Privacy-Related Decisions
The Value of Personal Data
9.

電子ブック

EB
edited by Farouk Toumani, Barbara Pernici, Daniela Grigori, Djamal Benslimane, Jan Mendling, Nejib Ben Hadj-Alouane, Brian Blake, Olivier Perrin, Iman Saleh Moustafa, Sami Bhiri
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 8954
オンライン: http://dx.doi.org/10.1007/978-3-319-22885-3
目次情報: 続きを見る
Engineering service-oriented applications
Resource management in service-oriented computing
Knowledge aware service oriented applications
Intelligent service clouds
Self-managing pervasive service systems
Formal modeling and verification of service-based systems
Cloud Computing and scienfific applications
PhD symposium track
Demo track
Engineering service-oriented applications
Resource management in service-oriented computing
Knowledge aware service oriented applications
10.

電子ブック

EB
edited by Alessandro Fantechi, Patrizio Pelliccione
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9274
オンライン: http://dx.doi.org/10.1007/978-3-319-23129-7
目次情報: 続きを見る
Biological Immunity and Software Resilience: two faces of the same coin?
Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems: A decomposition method for the verification of a real-time safety-critical protocol
Considering execution environment resilience: A white-box approach: Engineering Cross-Layer Fault Tolerance in Many-Core Systems
Risk assessment based cloudification
Stochastic Model-Based Analysis of Energy Consumption in a Rail Road Switch Heating System
Bidirectional Crosslinking of System and Software Modeling in the Automotive Domain
Tejo: a supervised anomaly detection scheme for NewSQL databases
Resiliency Variance in Workows with Choice
Biological Immunity and Software Resilience: two faces of the same coin?
Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems: A decomposition method for the verification of a real-time safety-critical protocol
Considering execution environment resilience: A white-box approach: Engineering Cross-Layer Fault Tolerance in Many-Core Systems